This course content was originally written by Arosha K. Bandara and Maria Townsend. It was adapted by Chitra Balakrishna into the Gamified Intelligent Cyber Aptitude and Skills Training (GICAST) course, published in January 2021. This course was funded by.
Except for third party materials and otherwise stated in the acknowledgements section, this content is made available under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 Licence.
The material acknowledged below is Proprietary and used under licence (not subject to Creative Commons Licence). Grateful acknowledgement is made to the following sources for permission to reproduce material in this course:
Figure 1 © agsandrew (via Fotolia)
Figure 3 © beaucroft (via iStock Photo)
Figure 4 © piotr_malczyk (via iStock Photo)
Figure 5 © dcdp (via iStock)
Figure 6 © dsteller (via iStock Photo)
Figure 7 © Garry518 (via iStock Photo)
Figure 8 © Andrey_Kuzmin (via iStock Photo)
Figure 9 © FredFroese (via iStock Photo)
Figure 10 © lek2481 (via iStock Photo)
Figure 11 © CBC taken from: https://www.cbc.ca/news/canada/nova-scotia/two-factor-verification-online-banking-security-1.5306052
Figure 12 © David Clark (via Getty Images)
Figure 13 © pagadesign (via iStock Photo)
Figure 14 © Alan Uster (via Shutterstock)
2.1 How to pick a proper password (including transcript) © Sophos
Every effort has been made to contact copyright owners. If any have been inadvertently overlooked, the publishers will be pleased to make the necessary arrangements at the first opportunity.
Don't miss out:
1. Join over 200,000 students, currently studying with The Open University – http://www.open.ac.uk/ choose/ ou/ open-content
2. Enjoyed this? Find out more about this topic or browse all our free course materials on OpenLearn – http://www.open.edu/ openlearn/
3. Outside the UK? We have students in over a hundred countries studying online qualifications – http://www.openuniversity.edu/ – including an MBA at our triple accredited Business School.